873 research outputs found

    The superposition of algebraic solitons for the modified Korteweg-de Vries equation

    Get PDF
    postprin

    Separable and anonymous identity-based key issuing

    Get PDF
    In identity-based (ID-based) cryptosystems, a local registration authority (LRA) is responsible for authentication of users while the key generation center (KGC) is responsible for computing and sending the private keys to users and therefore, a secure channel is required. For privacy-oriented applications, it is important to keep in secret whether the private key corresponding to a certain identity has been requested. All of the existing ID-based key issuing schemes have not addressed this anonymity issue. Besides, the separation of duties of LRA and KGC has not been discussed as well. We propose a novel separable and anonymous ID-based key issuing scheme without secure channel. Our protocol supports the separation of duties between LRA and KGC. The private key computed by the KGC can be sent to the user in an encrypted form such that only the legitimate key requester authenticated by LRA can decrypt it, and any eavesdropper cannot know the identity corresponding to the secret key. Β© 2005 IEEE.published_or_final_versio

    Digital evidence search kit

    Get PDF
    With the rapid development of electronic commerce and Internet technology, cyber crimes have become more and more common. There is a great need for automated software systems that can assist law enforcement agencies in cyber crime evidence collection. This paper describes a cyber crime evidence collection tool called DESK (Digital Evidence Search Kit), which is the product of several years of cumulative efforts of our Center together with the Hong Kong Police Force and several other law enforcement agencies of the Hong Kong Special Administrative Region. We will use DESK to illustrate some of the desirable features of an effective cyber crime evidence collection tool. Β© 2005 IEEE.published_or_final_versio

    Protecting digital legal professional privilege LPP data

    Get PDF
    The Best Paper AwardTo enable free communication between legal advisor and his client for proper functioning of the legal system, certain documents, known as Legal professional privilege (LPP) documents, can be excluded as evidence for prosecution. In physical world, protection of LPP information is well addressed and proper procedure for handling LPP articles has been established. However, there does not exist a forensically sound procedure for protecting 'digital' LPP information. In this paper, we try to address this important, but rarely addressed, issue. We point out the difficulties of handling digital LPP data and discuss the shortcomings of the current practices, then we propose a feasible procedure for solving this problem. Β© 2008 IEEE.published_or_final_versionThe 3rd International Workshop on Systematic Approaches to Digital Forensic Engineering (IEEE/SADFE 2008), Oakland, CA., 22 May 2008. In Proceedings of the 3rd SADFE, 2008, p. 91-10

    Improvement of bone properties and enhancement of mineralization by ethanol extract of Fructus Ligustri Lucidi

    Get PDF
    2007-2008 > Academic research: refereed > Publication in refereed journalVersion of RecordPublishe

    Superpulsed low-level laser therapy protects skeletal muscle of mdx mice against damage, inflammation and morphological changes delaying dystrophy progression.

    Get PDF
    Aim: To evaluate the effects of preventive treatment with low-level laser therapy (LLLT) on progression of dystrophy in mdx mice. Methods: Ten animals were randomly divided into 2 experimental groups treated with superpulsed LLLT (904 nm, 15 mW, 700 Hz, 1 J) or placebo-LLLT at one point overlying the tibialis anterior muscle (bilaterally) 5 times per week for 14 weeks (from 6th to 20th week of age). Morphological changes, creatine kinase (CK) activity and mRNA gene expression were assessed in animals at 20th week of age. Results: Animals treated with LLLT showed very few morphological changes in skeletal muscle, with less atrophy and fibrosis than animals treated with placebo-LLLT. CK was significantly lower (p = 0.0203) in animals treated with LLLT (864.70 U.lβˆ’1, SEM 226.10) than placebo (1708.00 U.lβˆ’1, SEM 184.60). mRNA gene expression of inflammatory markers was significantly decreased by treatment with LLLT (p<0.05): TNF-Ξ± (placebo-control = 0.51 Β΅g/Β΅l [SEM 0.12], - LLLT = 0.048 Β΅g/Β΅l [SEM 0.01]), IL-1Ξ² (placebo-control = 2.292 Β΅g/Β΅l [SEM 0.74], - LLLT = 0.12 Β΅g/Β΅l [SEM 0.03]), IL-6 (placebo-control = 3.946 Β΅g/Β΅l [SEM 0.98], - LLLT = 0.854 Β΅g/Β΅l [SEM 0.33]), IL-10 (placebo-control = 1.116 Β΅g/Β΅l [SEM 0.22], - LLLT = 0.352 Β΅g/Β΅l [SEM 0.15]), and COX-2 (placebo-control = 4.984 Β΅g/Β΅l [SEM 1.18], LLLT = 1.470 Β΅g/Β΅l [SEM 0.73]). Conclusion: Irradiation of superpulsed LLLT on successive days five times per week for 14 weeks decreased morphological changes, skeletal muscle damage and inflammation in mdx mice. This indicates that LLLT has potential to decrease progression of Duchenne muscular dystrophy

    Intrusion detection routers: Design, implementation and evaluation using an experimental testbed

    Get PDF
    In this paper, we present the design, the implementation details, and the evaluation results of an intrusion detection and defense system for distributed denial-of-service (DDoS) attack. The evaluation is conducted using an experimental testbed. The system, known as intrusion detection router (IDR), is deployed on network routers to perform online detection on any DDoS attack event, and then react with defense mechanisms to mitigate the attack. The testbed is built up by a cluster of sufficient number of Linux machines to mimic a portion of the Internet. Using the testbed, we conduct real experiments to evaluate the IDR system and demonstrate that IDR is effective in protecting the network from various DDoS attacks. Β© 2006 IEEE.published_or_final_versio

    Disparities and risks of sexually transmissible infections among men who have sex with men in China: a meta-analysis and data synthesis.

    Get PDF
    BACKGROUND: Sexually transmitted infections (STIs), including Hepatitis B and C virus, are emerging public health risks in China, especially among men who have sex with men (MSM). This study aims to assess the magnitude and risks of STIs among Chinese MSM. METHODS: Chinese and English peer-reviewed articles were searched in five electronic databases from January 2000 to February 2013. Pooled prevalence estimates for each STI infection were calculated using meta-analysis. Infection risks of STIs in MSM, HIV-positive MSM and male sex workers (MSW) were obtained. This review followed the PRISMA guidelines and was registered in PROSPERO. RESULTS: Eighty-eight articles (11 in English and 77 in Chinese) investigating 35,203 MSM in 28 provinces were included in this review. The prevalence levels of STIs among MSM were 6.3% (95% CI: 3.5-11.0%) for chlamydia, 1.5% (0.7-2.9%) for genital wart, 1.9% (1.3-2.7%) for gonorrhoea, 8.9% (7.8-10.2%) for hepatitis B (HBV), 1.2% (1.0-1.6%) for hepatitis C (HCV), 66.3% (57.4-74.1%) for human papillomavirus (HPV), 10.6% (6.2-17.6%) for herpes simplex virus (HSV-2) and 4.3% (3.2-5.8%) for Ureaplasma urealyticum. HIV-positive MSM have consistently higher odds of all these infections than the broader MSM population. As a subgroup of MSM, MSW were 2.5 (1.4-4.7), 5.7 (2.7-12.3), and 2.2 (1.4-3.7) times more likely to be infected with chlamydia, gonorrhoea and HCV than the broader MSM population, respectively. CONCLUSION: Prevalence levels of STIs among MSW were significantly higher than the broader MSM population. Co-infection of HIV and STIs were prevalent among Chinese MSM. Integration of HIV and STIs healthcare and surveillance systems is essential in providing effective HIV/STIs preventive measures and treatments. TRIAL REGISTRATION: PROSPERO NO: CRD42013003721
    • …
    corecore